International Journal of Engineering Research and Development e-ISSN: 2278-067X, p-ISSN: 2278-800X, www.ijerd.com Volume 10, Issue 12 (December 2014), PP.75-92 75 Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD Dr. H. B. Kekre 1 , Dr. Tanuja Sarode 2 , Shachi Natu 3 1 Senior Professor, Computer Engg. Dept., MPSTME, Vileparle, Mumbai, India. 2 Associate Professor, Computer Dept. TSEC, Bandra, Mumbai, India. 3 Ph. D. Research Scholar, MPSTME, Vileparle, Mumbai, India. Abstract:- In this paper a novel approach of watermarking using hybrid transform and SVD is proposed. Hybrid transform is generated from existing orthogonal transforms of different sizes by taking their kronecker product. DCT, Walsh, and Haar transforms are used to generate the hybrid transforms DCT-Walsh, Walsh- DCT, DCT-Haar, Haar-DCT, Walsh-Haar andHaar-Walsh. Each hybrid transform is applied column wise/row wise on host. Singular Value Decomposition of watermark is obtained and first few singular values of watermark are embedded in middle frequency band of hybrid column/row transformed host. Robustness of proposed approach is evaluated against image compression, cropping, noise addition, image resizing and histogram equalization attack. Performance of hybrid transform shows improvement against compression attack by 59%, against noise addition by 70% and against resizing by 32-56% when compared to hybrid wavelet transforms. Keywords:- Watermarking, Singular Value Decomposition, Hybrid transform, Kronecker product, Hybrid wavelet transform I. INTRODUCTION Due to use of internet technology, vast amount of information is generated with a single click. Security of this information is equally important. Usually availability of various tools makes distribution and manipulation of digital information very easy. This may lead to claiming the digital information by someone else other than owner. To avoid this, some technique is required wherein the information of owner can be embedded in the digital information to be transmitted thus preventing illegal claim of ownership or can detect any alterations done in the digital information. Watermarking fulfils this need. Different types of information like identity of owner, logo of company etc. can be embedded in the information to be protected. The information to be protected is called host or cover and the secret information embedded in it is called as watermark. Depending on type of cover, watermarking can be classified as digital image watermarking, audio and video watermarking. In the proposed work focus is on watermarking of digital images. Depending on how the watermark is embedded in image, it is classified as spatial domain and frequency domain watermarking. Spatial domain watermarking directly deals with pixel intensities of image. Frequency domain watermarking first converts image into another form i.e. its frequency representation using transformation techniques and then changes those frequency coefficients in such a way that hidden watermark goes unnoticeable with host. Some more classifications of watermarking include visible and invisible watermarking. As the name suggests it either reveals or hides the existence of watermark in host image depending on the purpose for which it is used. Robust and fragile watermarking is yet another category of image watermarking. In robust watermarking, any change in the host will try to prevent destruction of hidden watermark. Thus attacker cannot easily change or remove hidden watermark to change the ownership information. In fragile watermarking, small change to image information will easily damage the hidden watermark thereby detecting the unauthorised changes in contents of host. Varieties of watermarking techniques available in literature are overviewed in the next section. II. REVIEW OF LITERATURE In literature many spatial domain techniques were initially introduced to hide the watermark. Though spatial domain techniques are not as robust as frequency domain techniques, due to their simplicity they are still attracting the researchers. Some such spatial domain techniques have been presented in [1], [2], [3] and [4] where LSB of host is used to hide MSB of watermark. To improve the robustness, instead of using LSB, 3rd or 4th LSB are preferred to hide the watermark. Also operations like shifting the watermark bits or embedding watermark bits multiple times at different positions in host are proposed. To have robust watermarking where watermarks can survive the attacks on digital contents, we need to move to frequency domain watermarking. Transforms like DCT [5], [6], [7], Discrete wavelet transforms (DWT) [8], [9], [10], Singular Value Decomposition [11], [12] are some of the popularly used transformation
18
Embed
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
International Journal of Engineering Research and Development
From Table I it can be seen that except JPEG compression and VQ based compression, against all other
types of compression attacks, all explored hybrid transforms show strong robustness.
B. Cropping Attack
Watermarked images are cropped at different regions: at corners and at centre. 16x16 size squares and
32x32 size squares are cropped at the corners of watermarked image to observe the effect of cropping more
information. 32x32 size square is cropped at the centre where number of pixels cropped is same as in case of
cropping 16x16 pixels at four corners. Fig. 4 shows the result images for cropping 32x32 at centre attack using
column hybrid transforms.
Watermarked
image after
cropping
Extracted
watermark
Watermarked
image after
cropping
Extracted
watermark
MAE=1.856 MAE=61.781 MAE=1.856 MAE=165.969
DCT-Walsh Walsh-DCT
MAE=1.856 MAE=25.533 MAE=1.856 MAE=0
DCT-Haar Haar-DCT
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
80
MAE=1.856 MAE=144.594 MAE=1.855 MAE=0
Walsh-Haar Haar-Walsh
Fig. 4: Results of various hybrid transforms against cropping 32x32 portion at centre.
From Fig. 4 it is observed that when Haar is used as base transform (first component) during generation
of hybrid transform, highest robustness against cropping attack is obtained. Thus Haar-DCT and Haar-Walsh
column hybrid transform show excellent robustness against cropping. On the other hand Walsh when used as
base transform in the generation of hybrid transform cannot withstand the cropping attack. In case of row
versions of hybrid transforms also transforms having Haar as base transform perform very well against cropping
attack.
Table II shows Average MAE between embedded and extracted watermark against cropping attack for
column and row versions of hybrid transforms.
Table II: Average MAE between embedded and extracted watermark against cropping attack using
various hybrid transforms
Cropping type
Column DCT-Walsh
Column Walsh-DCT
Column DCT-Haar
Column Haar-DCT
Column Walsh-Haar
Column Haar-Walsh
16x16 at corners
58.328 55.231 51.901 115.660 55.613 123.134
32x32 at corners
35.162 27.042 33.539 242.896 26.898 260.219
32x32 at centre
71.125 95.420 61.814 0.749 90.048 0
Cropping type
Row DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-
Walsh
16x16 at corners
56.626 36.456 49.493 73.904 29.773 83.985
32x32 at corners
34.500 45.407 35.560 254.603 46.026 281.515
32x32 at centre
48.616 51.125 45.665 1.885 41.382 3.048
From Table 2 it can be concluded that for cropping at centre, hybrid transform column as well as row
with Haar as the base transform shows strong robustness.
C. Noise addition attack
Two types of noises binary distributed run length noise and Gaussian distributed run length noise are
added to watermarked images. Binary distributed noise is added with different run length like 1 to10, 5 to 50
and 10 to 100. Fig. 5 shows the watermarked images with Gaussian distributed noise added to them and
watermark extracted from them when different hybrid transforms are used to embed the watermark.
Watermarked
image after
compression
Extracted watermark
Watermarked
image after
compression
Extracted
watermark
MAE=0.746 MAE=1.968 MAE=0.746 MAE=2.213
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
81
Fig. 5: Results of various hybrid transforms against Gaussian distributed run length noise.
From Fig. 5 it is observed that column hybrid transforms show excellent robustness against Gaussian
distributed run length noise added to watermarked images. For binary distributed run length noise also, hybrid
transforms shoe very well sustenance. Table 3 shows average MAE between embedded and extracted watermark
from five different host images using column and row version of hybrid transforms.
Table III Average MAE between embedded and extracted watermark against noise addition attack using
various hybrid transforms
Noise type Column DCT-
Walsh
Column Walsh-DCT
Column DCT-Haar
Column Haar-DCT
Column Walsh-Haar
Column Haar-Walsh
Binary distributed run length noise
(1-10)
0 0 0 0 0 0
Binary distributed run length noise
(5-50)
1.963 2.568 2.374 1.945 2.088 2.766
Binary distributed run length noise
(50-100)
2.433 2.239 2.015 2.261 2.059 2.282
Gaussian distributed run
length noise
2.087 2.207 2.037 2.243 2.109 2.413
Noise Type Row
DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-
Walsh
Binary distributed run length noise
(1-10)
5.755 4.897 4.036 3.840 6.381 3.961
Binary distributed run length noise
(5-50)
5.411 4.702 4.676 4.316 4..140 4.234
Binary distributed run length noise
(50-100)
3.656 3.430 3.512 3.011 3.101 3.632
Gaussian distributed run
length noise
2.097 1.419 1.97 1.299 1.349 1.640
DCT-Walsh Walsh-DCT
MAE=0.746 MAE=1.727 MAE=0.746 MAE=1.708
DCT-Haar Haar-DCT
MAE=0.746 MAE=2.209 MAE=0.746 MAE=2.970
Walsh-Haar Haar-Walsh
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
82
Table 3 shows that all hybrid transforms explored in proposed approach sustain noise addition attack
very strongly. Column hybrid transforms show better robustness over row hybrid transforms against binary
distributed run length noise attack.
D. Resizing attack
In resizing attack, watermarked image is first increased in size two times and then reduced to its
original size. This is achieved by three different mechanisms: bicubic interpolation, transform based zooming
[31] and grid based interpolation [32]. In transform based zooming, different transforms like DCT, DST, DFT,
Real Fourier Transform and Hartley transform are used to zoom and reduce the watermarked image. Fig. 6
shows result images for bicubic interpolation based resizing for column hybrid transforms used for embedding
the watermark.
Watermarked
image after
compression
Extracted
watermark
Watermarked
image after
compression
Extracted
watermark
MAE=3.770 MAE=18.886 MAE=3.766 MAE=20.349
DCT-Walsh Walsh-DCT
MAE=3.769 MAE=18.159 MAE=3.763 MAE=21.340
DCT-Haar Haar-DCT
MAE=3.768 MAE=19.437 MAE=3.762 MAE=20.842
Walsh-Haar Haar-Walsh
Fig. 6: Results of various hybrid transforms against resizing using bicubic interpolation
Table IV shows average MAE between embedded and extracted watermark when different hybrid
transforms (column and row versions) are used to embed watermark.
Table IV Average MAE between embedded and extracted watermark against resizing attack
using various hybrid transforms Resizing type Column DCT-
Walsh Column Walsh-
DCT Column
DCT-Haar Column Haar-
DCT Column
Walsh-Haar Column Haar-
Walsh
Bicubic Interpolation
19.371 18.479 19.200 17.661 19.015 17.731
DFT 0.619 0.689 0.627 0.644 0.679 0.692
Grid based Interpolation
6.061 6.567 5.900 3.708 8.425 4.935
Resizing Type Row DCT-
Walsh
Row Walsh-
DCT
Row DCT-
Haar
Row Haar-
DCT
Row Walsh-
Haar
Row Haar-Walsh
Bicubic Interpolation
20.412 17.767 20.340 15.980 19.321 18.403
DFT 0.950 0.727 0.927 0.979 0.732 1.013
Grid based Interpolation
6.699 5.826 6.173 3.660 8.105 5.089
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
83
From Table IV, it is observed that column as well as row hybrid transforms show excellent robustness
against resizing using DFT. For other transforms used to resize the watermarked image, MAE between
embedded and extracted watermark is found to be zero. Thus we can conclude that proposed watermarking
approach is strongly robust against transform based image resizing attack. Next high level robustness is obtained
against resizing using grid based interpolation as shown in Table 4. For resizing using bicubic interpolation the
quality of extracted watermark is acceptable. Similar results are obtained for row hybrid transforms also.
E. Histogram Equalization
Fig. 7 shows result images of Mandrill after equalizing its histogram for various column hybrid
transforms.
Watermarked
image after
compression
Extracted
watermark
Watermarked
image after
compression
Extracted
watermark
MAE=23.223 MAE=72.655 MAE=23.218 MAE=78.530
DCT-Walsh Walsh-DCT
MAE=23.223 MAE=72.651 MAE=23.208 MAE=79.643
DCT-Haar Haar-DCT
MAE=23.218 MAE=78.091 MAE=23.215 MAE=71.060
Walsh-Haar Haar-Walsh
Fig. 7: Results of various hybrid transforms against histogram equalization
As can be seen from Fig. 7, MAE values between embedded and extracted watermark are higher due to
changes in their pixel intensity values. Similar behaviour is depicted by row versions of hybrid transforms.
VI. PERFORMANCE COMPARISON WITH HYBRID WAVELET TRANSFORMS Performance of proposed approach using hybrid transforms is compared with our previous work of
hybrid wavelet transforms.
A. Compression attack:
1) Column hybrid wavelet vs. Column hybrid transform
Fig. 8 shows comparison of column hybrid wavelet transforms and column hybrid transforms against
compression attack.
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
84
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 8: Column hybrid wavelet transforms vs. column hybrid transforms against compression attack.
From Fig. 8 it can be observed that hybrid transforms perform better than hybrid wavelet transforms.
For transform based compression this improvement is from 6% to 95%. For JPEG compression it is 23% to 38%
better. For VQ based compression the improvement in robustness by hybrid transforms is 20% to 44%.
2) Row hybrid wavelet transforms vs. row hybrid transforms Fig. 9 shows comparison of row hybrid wavelet transforms and row hybrid transforms against
compression attack. Similar to column hybrid transforms, row hybrid transforms improve the robustness against
compression attack by more or less similar range.
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
85
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 9: Row hybrid wavelet transforms vs. row hybrid transforms against compression attack. B. Cropping attack
1) Column hybrid wavelet transforms vs. column hybrid transform
Fig. 10 shows comparison of column hybrid wavelet transform and column hybrid transforms against
cropping attack. From Fig. 10 it is observed that hybrid transforms cannot perform better than hybrid wavelet
transforms in column version against compression attack. Hybrid wavelet transforms are much better in
robustness.
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
86
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 10: Column hybrid wavelet transforms vs. column hybrid transforms against cropping attack.
2) Row hybrid wavelet transforms vs. row hybrid transforms
Fig. 11 shows comparison of row hybrid wavelet transforms and row hybrid transforms against
cropping attack. Observations for row hybrid wavelet transforms and hybrid transforms are similar to that of
column transforms. Hybrid wavelet transforms better sustain against cropping attack than hybrid transforms.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh (b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
87
hybrid transform hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 11: Row hybrid wavelet transforms vs. row hybrid transforms against cropping attack.
C. Noise addition attack
1) Column hybrid wavelet transform vs. column hybrid transform Fig. 12 compares column hybrid transforms with column hybrid wavelet transforms against noise
addition attack. In column version of hybrid transforms and hybrid wavelet transforms, MAE obtained for
smaller run length (1 to 10) of binary distributed run length noise is zero. Therefore it is not shown in the graph.
However, for row transforms, it is nonzero and hence can be compared.
From Fig. 12 it is observed that all hybrid transforms show up to 70% improved robustness against
binary distributed run length noise with run length 5 to 50 and 10 to 100. But for Gaussian distributed run length
noise, hybrid wavelet transforms are more robust.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
88
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 12: Column hybrid wavelet transforms vs. column hybrid transforms against noise addition attack.
2) Row hybrid wavelet vs. row hybrid transforms
Fig. 13 compares row hybrid transforms with row hybrid wavelet transforms. Behaviour of row hybrid
transforms and row hybrid wavelet transforms is opposite to that of column transforms. Thus in row version,
hybrid transforms perform better than hybrid wavelet transform against Gaussian distributed run length noise.
For Binary distributed run length noise, hybrid wavelet transform show better robustness than hybrid transforms.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid (d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
89
transform transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 13: Row hybrid wavelet transforms vs. row hybrid transforms against noise addition attack.
D. Resizing attack
1) Column hybrid wavelet transforms vs. column hybrid transforms
Fig. 14 compares column versions of hybrid wavelet and hybrid transforms against resizing attack.
Hybrid transforms improve the robustness significantly up to 32% against bicubic interpolation based resizing
and up to 56% against resizing using DFT. For the combination of Walsh-DCT, Haar-DCT and Walsh-Haar,
hybrid wavelet transforms are more robust than hybrid transforms against resizing using grid interpolation.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
90
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Fig. 14: Column hybrid wavelet transforms vs. column hybrid transforms against resizing attack.
2) Row hybrid wavelet transforms vs. row hybrid transforms
Fig. 15 compares hybrid wavelet transforms and hybrid transforms against resizing attack in their row
versions. Performance of row versions is similar to that of column versions. Hybrid transforms are more robust
than hybrid wavelet transforms.
(a)DCT-Walsh hybrid wavelet vs. DCT-Walsh
hybrid transform
(b)Walsh-DCT hybrid wavelet vs. Walsh-DCT
hybrid transform
(c)DCT-Haar hybrid wavelet vs. Haar-DCT hybrid
transform
(d)Haar-DCT hybrid wavelet vs. Haar-DCT hybrid
transform
(e)Walsh-Haar hybrid wavelet vs. Walsh-Haar
hybrid transform
(f)Haar-Walsh hybrid wavelet vs. Haar-Walsh
hybrid transform
Robust Watermarking Using Hybrid Transform of DCT, Haar and Walsh and SVD
91
Fig. 15: Row hybrid wavelet transforms vs. row hybrid transforms against resizing attack.
VII. CONCLUSIONS In the proposed approach of watermarking using hybrid transforms, desirable characteristics of two
transforms are clubbed in one transform by taking their kronecker product. Hybrid transforms in their column
and row versions improve the performance of individual component transforms. At the same time they also
show significant improvement in robustness against various attacks over hybrid wavelet transforms. For
different attacks percentage improvement shown by hybrid transforms is given in following Table V.
Table V Performance improvement by hybrid transforms over hybrid